Netiq® Cloudaccess and Mobileaccess Installation and Configuration Guide
Total Page:16
File Type:pdf, Size:1020Kb
NetIQ® CloudAccess and MobileAccess Installation and Configuration Guide September 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE AGREEMENT. EXCEPT AS EXPRESSLY SET FORTH IN SUCH LICENSE AGREEMENT OR NON-DISCLOSURE AGREEMENT, NETIQ CORPORATION PROVIDES THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SOME STATES DO NOT ALLOW DISCLAIMERS OF EXPRESS OR IMPLIED WARRANTIES IN CERTAIN TRANSACTIONS; THEREFORE, THIS STATEMENT MAY NOT APPLY TO YOU. For purposes of clarity, any module, adapter or other similar material ("Module") is licensed under the terms and conditions of the End User License Agreement for the applicable version of the NetIQ product or software to which it relates or interoperates with, and by accessing, copying or using a Module you agree to be bound by such terms. If you do not agree to the terms of the End User License Agreement you are not authorized to use, access or copy a Module and you must destroy all copies of the Module and contact NetIQ for further instructions. This document and the software described in this document may not be lent, sold, or given away without the prior written permission of NetIQ Corporation, except as otherwise permitted by law. Except as expressly set forth in such license agreement or non-disclosure agreement, no part of this document or the software described in this document may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, or otherwise, without the prior written consent of NetIQ Corporation. Some companies, names, and data in this document are used for illustration purposes and may not represent real companies, individuals, or data. This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. NetIQ Corporation may make improvements in or changes to the software described in this document at any time. U.S. Government Restricted Rights: If the software and documentation are being acquired by or on behalf of the U.S. Government or by a U.S. Government prime contractor or subcontractor (at any tier), in accordance with 48 C.F.R. 227.7202-4 (for Department of Defense (DOD) acquisitions) and 48 C.F.R. 2.101 and 12.212 (for non-DOD acquisitions), the government’s rights in the software and documentation, including its rights to use, modify, reproduce, release, perform, display or disclose the software or documentation, will be subject in all respects to the commercial license rights and restrictions provided in the license agreement. © 2014 NetIQ Corporation. All Rights Reserved. For information about NetIQ trademarks, see https://www.netiq.com/company/legal/. About this Book and the Library The Installation and Configuration Guide provides conceptual information about the NetIQ CloudAccess (CloudAccess) and NetIQ MobileAccess (MobileAccess) products. This book contains configuration information for the appliance and for the SaaS applications. NOTE: Many of the topics in this guide are applicable to both CloudAccess and MobileAccess users. However, certain features of the CloudAccess product are not included with the MobileAccess license. Those product features that are visible to MobileAccess users, but are licensed only to CloudAccess users, are clearly marked in this guide. Intended Audience This book provides information for individuals responsible for deploying and configuring the appliance and configuring application connectors. Other Information in the Library The library provides the following information resources: Help Provides context-sensitive information and step-by-step guidance for common tasks, as well as definitions for fields in windows of the administration console. About this Book and the Library 3 4 NetIQ® CloudAccess and MobileAccess Installation and Configuration Guide About NetIQ Corporation We are a global, enterprise software company, with a focus on the three persistent challenges in your environment: Change, complexity and risk—and how we can help you control them. Our Viewpoint Adapting to change and managing complexity and risk are nothing new In fact, of all the challenges you face, these are perhaps the most prominent variables that deny you the control you need to securely measure, monitor, and manage your physical, virtual, and cloud computing environments. Enabling critical business services, better and faster We believe that providing as much control as possible to IT organizations is the only way to enable timelier and cost effective delivery of services. Persistent pressures like change and complexity will only continue to increase as organizations continue to change and the technologies needed to manage them become inherently more complex. Our Philosophy Selling intelligent solutions, not just software In order to provide reliable control, we first make sure we understand the real-world scenarios in which IT organizations like yours operate—day in and day out. That's the only way we can develop practical, intelligent IT solutions that successfully yield proven, measurable results. And that's so much more rewarding than simply selling software. Driving your success is our passion We place your success at the heart of how we do business. From product inception to deployment, we understand that you need IT solutions that work well and integrate seamlessly with your existing investments; you need ongoing support and training post-deployment; and you need someone that is truly easy to work with—for a change. Ultimately, when you succeed, we all succeed. Our Solutions Identity & Access Governance Access Management Security Management Systems & Application Management Workload Management Service Management About NetIQ Corporation 5 Contacting Sales Support For questions about products, pricing, and capabilities, contact your local partner. If you cannot contact your partner, contact our Sales Support team. Worldwide: www.netiq.com/about_netiq/officelocations.asp United States and Canada: 1-888-323-6768 Email: [email protected] Web Site: www.netiq.com Contacting Technical Support For specific product issues, contact our Technical Support team. Worldwide: www.netiq.com/support/contactinfo.asp North and South America: 1-713-418-5555 Europe, Middle East, and Africa: +353 (0) 91-782 677 Email: [email protected] Web Site: www.netiq.com/support Contacting Documentation Support Our goal is to provide documentation that meets your needs. The documentation for this product is available on the NetIQ website in HTML and PDF formats on a page that does not require you to log in. If you have suggestions for documentation improvements, click comment on this topic at the bottom of any page in the HTML version of the documentation posted at www.netiq.com/ documentation. You can also email [email protected]. We value your input and look forward to hearing from you. Contacting the Online User Community NetIQ Communities, the NetIQ online community, is a collaborative network connecting you to your peers and NetIQ experts. By providing more immediate information, useful links to helpful resources, and access to NetIQ experts, NetIQ Communities helps ensure you are mastering the knowledge you need to realize the full potential of IT investments upon which you rely. For more information, visit community.netiq.com. 6 NetIQ® CloudAccess and MobileAccess Installation and Configuration Guide Contents About this Book and the Library 3 About NetIQ Corporation 5 1 Overview of NetIQ CloudAccess 13 1.1 Inherent Problems Using SaaS Applications . .13 1.2 The Solution That CloudAccess Provides . 14 1.3 How CloudAccess Works. 15 1.4 How CloudAccess Fits into Your Network . 15 1.5 Understanding Product Licensing . 16 2 Installing the Appliance 17 2.1 Installation and Configuration Checklist . 17 2.2 Product Requirements . 18 2.3 Identity Source Requirements . 20 2.3.1 Active Directory Requirements . 21 2.3.2 eDirectory Requirements . .21 2.3.3 JDBC Requirements . 22 2.3.4 Self-Service User Store Requirements . 27 2.4 Appliance Installation Worksheet . 28 2.5 Deploying the Appliance . 28 2.6 Upgrading Your Environment. 29 2.7 Initializing the Appliance. 29 3 Configuring the Appliance 31 3.1 Accessing the Administration Console. 31 3.2 Getting Started . 32 3.3 Registering the Appliance . 32 3.4 Configuring Network Options . 33 3.4.1 Configuring the Forward Proxy . 33 3.4.2 Configuring the Second Network Interface . 34 3.4.3 Configuring the Routing Table . 34 3.4.4 A Sample Network Configuration. 35 3.5 Changing the Certificates on the Appliance . 35 3.6 Verifying the Identity Source User Attributes . 36 3.7 Configuring Additional Identity Sources . 36 3.7.1 Configuring Self-Service Registration and Password Management . 37 3.7.2 Configuring Additional Identity Sources. 42 3.7.3 Configuring SAML 2.0 Inbound Identity Sources. 42 3.8 Configuring Roles Management. 43 3.8.1 Defining the Role Types . 43 3.8.2 Assigning Roles to Users. 44 3.9 Configuring Clustering . 44 3.9.1 Advantages of Clustering. 44 3.9.2 Managing Nodes in the Cluster . 45 3.9.3 Configuring an L4 Switch for Clustering . 46 3.9.4 Configuring an L4 Switch for Email Proxy . 47 3.10 Configuring Integrated Windows Authentication with Kerberos . 49 Contents 7 3.10.1 Configuring the Kerberos User in Active Directory . 49 3.10.2 Configuring the Appliance to Use Integrated Windows Authentication with Kerberos. 50 3.10.3 Configuring User Browsers . .50 3.11 Configuring Google reCAPTCHA. 50 3.11.1 Requirements for reCAPTCHA . 51 3.11.2 Configuring Intrusion Detection for Failed Logins . 51 3.11.3 Configuring a Google reCAPTCHA Account . 52 3.11.4 Configuring the reCAPTCHA Tool .